Messaging Security

Results: 466



#Item
251Internet / Internet protocols / Internet standards / Secure communication / Public-key cryptography / Transport Layer Security / Extensible Messaging and Presence Protocol / Internet security / Vulnerability / Computing / Cryptography / Cryptographic protocols

Improving Security on the Internet (with improved Collaboration) Hannes Tschofenig [removed] Abstract Securing the Internet has been an on-going activity since the early days of the IETF and a variety of

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-03-10 16:49:33
252Skype / Smartphones / Teleconferencing / Portable software / IPhone / Tap / Videophone / Skype security / Skype protocol / Software / Computing / Videotelephony

659130054610000TAVVI Quick Start Guide for Skype Description: Skype for iPhone provides free Skype to Skype messaging, voice or video calls. NOTE: This guide assumes use of voice over. Step 1: Install Skype. Open app

Add to Reading List

Source URL: blindnotalone.com

Language: English - Date: 2014-08-14 11:46:39
253Computer-mediated communication / Cryptographic protocols / Spam filtering / Internet standards / DomainKeys Identified Mail / S/MIME / Simple Mail Transfer Protocol / Transport Layer Security / MIME / Computing / Email / Internet

draft-crocker-strint-workshop-messaging-00 - STRINT Workshop Position Paper: Levels of Opportunistic Privacy Protection for Messaging-Oriented Architectures

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
254Computing / Secure messaging / Electronics / Internet security / Transport Layer Security / Internet privacy / Email / Internet

SOC 3 for Security, Availability, Processing Integrity, and Confidentiality Independent Practioner’s Trust Services Report For the Period May 1, 2013 through October 15, 2014 Independent SOC 3 Report for the Security,

Add to Reading List

Source URL: cert.webtrust.org

Language: English - Date: 2014-12-02 09:11:00
255Cross-platform software / Extensible Messaging and Presence Protocol / Online chat / XMPP Standards Foundation / Transport Layer Security / Presence information / BOSH / Jingle / Computing / Instant messaging / Computer-mediated communication

draft-saintandre-strint-workshop-xmpp-00 - STRINT Workshop Position Paper: Strengthening the Extensible Messaging and Presence Protocol XMPP‚

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
256Supercomputers / Computer memory / Direct memory access / Motherboard / Myrinet / Trusted computing base / Kernel / Ring / Device driver / Computing / Computer hardware / Computer networks

Security of High-Performance Messaging Layers on Programmable Network Interface Architectures Srigurunath Chakravarthi [removed] Department of Computer Science Mississippi State University

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
257Internet Relay Chat / Internet culture / Online chat / Videotelephony / Corporate governance of information technology / Risk management / Internal audit / Computing / Computer-mediated communication / Security / Business / Instant messaging

Canadian Evaluation Society Organizational Review Information Management and Information Technology May 2012 Executive Summary An important part of our organizational review of CES was the evaluation of information manag

Add to Reading List

Source URL: evaluationcanada.ca

Language: English - Date: 2012-08-01 18:43:44
258Open standards / Cryptographic software / Cross-platform software / Extensible Messaging and Presence Protocol / Online chat / Encryption / Privacy / Opportunistic encryption / Distributed social network / Computing / Internet privacy / Ethics

A few thesis regarding privacy and security Subject: A few thesis regarding privacy and security From: "Andreas Kuckartz" Date: 01/20/2014 10:46 PM To: group-strint-submission@w3.org

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
259Data / Network Address Translation / Internet protocols / Network protocols / Data security / Extensible Messaging and Presence Protocol / STUN / Traversal Using Relays around NAT / Wireless security / Computing / Software / Computer network security

System Requirements About this Guide Thank you for considering BeamPro Thank you for your interest in purchasing the BeamPro Smart Presence™ System. We’re excited to

Add to Reading List

Source URL: d1qfx8fl7tbbtn.cloudfront.net

Language: English - Date: 2015-01-02 02:47:08
260Computing / Cybercrime / Spam filtering / Computer crimes / Computer network security / Phishing / Anti-spam techniques / Email spam / Anti-phishing software / Spamming / Internet / Email

Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 1.01, July 2006 A document jointly produced by the Messaging Anti-Abuse Working Group (MAAWG)

Add to Reading List

Source URL: www.m3aawg.org

Language: English - Date: 2009-12-21 17:01:45
UPDATE